Searched refs:sah (Results 1 - 14 of 14) sorted by relevance

/freebsd-13-stable/sys/netipsec/
H A Dkey.c964 struct secashead *sah; local
973 LIST_FOREACH(sah, SAHADDRHASH_HASH(saidx), addrhash) {
976 kdebug_secash(sah, " "));
977 if (sah->saidx.proto != IPPROTO_TCP)
979 if (!key_sockaddrcmp(&saidx->dst.sa, &sah->saidx.dst.sa, 0) &&
980 !key_sockaddrcmp(&saidx->src.sa, &sah->saidx.src.sa, 0))
983 if (sah != NULL) {
985 sav = TAILQ_LAST(&sah->savtree_alive, secasvar_queue);
987 sav = TAILQ_FIRST(&sah->savtree_alive);
1017 struct secashead *sah; local
1141 struct secashead *sah; local
1367 struct secashead *sah; local
2839 struct secashead *sah; local
2862 struct secashead *sah = *psah; local
2876 key_delsah(struct secashead *sah) argument
2901 struct secashead *sah; local
3007 LIST_INSERT_HEAD(SAHADDRHASH_HASH(saidx), sah, addrhash); local
3127 struct secashead *sah; local
4477 struct secashead *sah, *nextsah; local
5068 struct secashead *sah; local
5118 struct secashead *sah; local
5239 LIST_INSERT_HEAD(SAHADDRHASH_HASH(saidx), sah, addrhash); local
5836 key_setident(struct secashead *sah, const struct sadb_msghdr *mhp) argument
6060 struct secashead *sah; local
6122 struct secashead *sah; local
6944 struct secashead *sah; local
7408 struct secashead *sah, *nextsah; local
7452 struct secashead *sah, *nextsah; local
7565 struct secashead *sah; local
8324 struct secashead *sah; local
[all...]
H A Dxform_ah.c157 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6) {
585 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
595 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
641 error = ah_massage_headers(&m, sav->sah->saidx.dst.sa.sa_family,
706 saidx = &sav->sah->saidx;
861 switch (sav->sah->saidx.dst.sa.sa_family) {
875 sav->sah->saidx.dst.sa.sa_family,
876 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
885 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
899 ipsec_address(&sav->sah
[all...]
H A Dxform_ipcomp.c299 saidx = &sav->sah->saidx;
353 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
424 switch (sav->sah->saidx.dst.sa.sa_family) {
439 sav->sah->saidx.dst.sa.sa_family,
440 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
449 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
463 __func__, ipsec_address(&sav->sah->saidx.dst, buf,
582 __func__, ipsec_address(&sav->sah->saidx.dst, buf,
591 switch (sav->sah->saidx.dst.sa.sa_family) {
612 switch (sav->sah
[all...]
H A Dipsec_input.c289 IPSEC_ASSERT(sav->sah != NULL, ("null SAH"));
290 saidx = &sav->sah->saidx;
304 __func__, ipsec_address(&sav->sah->saidx.dst,
506 IPSEC_ASSERT(sav->sah != NULL, ("null SAH"));
507 saidx = &sav->sah->saidx;
519 __func__, ipsec_address(&sav->sah->saidx.dst, buf,
H A Dkey_debug.c789 kdebug_secash(struct secashead *sah, const char *indent) argument
792 IPSEC_ASSERT(sah != NULL, ("null sah"));
795 printf("SAH { refcnt=%u state=%s\n", sah->refcnt,
796 kdebug_secasv_state(sah->state));
799 kdebug_secasindex(&sah->saidx, indent);
854 kdebug_secash(sav->sah, " ");
973 ipsec_address(&sav->sah->saidx.src, sbuf, sizeof(sbuf)),
974 ipsec_address(&sav->sah->saidx.dst, dbuf, sizeof(dbuf)));
H A Dipsec_output.c222 dst = &sav->sah->saidx.dst;
233 error = ipsec_encap(&m, &sav->sah->saidx);
272 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf);
540 dst = &sav->sah->saidx.dst;
553 error = ipsec_encap(&m, &sav->sah->saidx);
587 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf);
722 saidx = &sav->sah->saidx;
H A Dkeydb.h155 struct secashead *sah; /* back pointer to the secashead */ member in struct:secasvar
H A Dxform_esp.c320 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
500 saidx = &sav->sah->saidx;
592 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
606 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)),
618 &sav->sah->saidx.dst, buf, sizeof(buf)),
722 saidx = &sav->sah->saidx;
H A Dudpencap.c222 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6)
H A Dipsec.c1302 if (sav->sah->saidx.proto == IPPROTO_ESP)
1304 else if (sav->sah->saidx.proto == IPPROTO_AH)
1343 if (sav->sah->saidx.proto == IPPROTO_ESP)
1345 else if (sav->sah->saidx.proto == IPPROTO_AH)
H A Dxform_tcp.c182 switch (sav->sah->saidx.dst.sa.sa_family) {
/freebsd-13-stable/sys/net/
H A Dif_ipsec.c465 if (sav->sah->saidx.mode != IPSEC_MODE_TUNNEL ||
466 sav->sah->saidx.proto != IPPROTO_ESP)
470 CK_LIST_FOREACH(sc, ipsec_idhash(sav->sah->saidx.reqid), idhash) {
474 sav->sah->saidx.src.sa.sa_family);
477 sav->sah->saidx.reqid != saidx->reqid)
480 if (key_sockaddrcmp(&sav->sah->saidx.dst.sa,
483 if (key_sockaddrcmp(&sav->sah->saidx.src.sa,
/freebsd-13-stable/sys/dev/qat/
H A Dqat.c1245 const struct auth_hash *sah = hash_def->qshd_alg->qshai_sah; local
1250 hmac_init_ipad(sah, key, klen, &ctx);
1253 hmac_init_opad(sah, key, klen, &ctx);
/freebsd-13-stable/sys/dev/ixl/
H A Di40e_adminq_cmd.h546 __le16 sah; member in struct:i40e_aqc_mng_laa

Completed in 215 milliseconds